100
User Manual WISE-6610 Series Indsutrial LoRaWAN Gateway

WISE-6610 Series UM · 2020. 2. 18. · WISE-6610 Series User Manual iv Warnings, Cautions and Notes Document Feedback To assist us in making improvements to this manual, we would

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

  • User Manual

    WISE-6610 Series

    Indsutrial LoRaWAN Gateway

  • CopyrightThe documentation and the software included with this product are copyrighted 2018by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the rightto make improvements in the products described in this manual at any time withoutnotice. No part of this manual may be reproduced, copied, translated or transmittedin any form or by any means without the prior written permission of Advantech Co.,Ltd. Information provided in this manual is intended to be accurate and reliable. How-ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe-ments of the rights of third parties, which may result from its use.

    AcknowledgementsIntel and Pentium are trademarks of Intel Corporation.Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.All other product names or trademarks are properties of their respective owners.

    Product Warranty (3 years)Advantech warrants to you, the original purchaser, that each of its products will befree from defects in materials and workmanship for three years from the date of pur-chase.This warranty does not apply to any products which have been repaired or altered bypersons other than repair personnel authorized by Advantech, or which have beensubject to misuse, abuse, accident or improper installation. Advantech assumes noliability under the terms of this warranty as a consequence of such events.Because of Advantech’s high quality-control standards and rigorous testing, most ofour customers never need to use our repair service. If an Advantech product is defec-tive, it will be repaired or replaced at no charge during the warranty period. For out of-warranty repairs, you will be billed according to the cost of replacement materials,service time and freight. Please consult your dealer for more details.If you think you have a defective product, follow these steps:1. Collect all the information about the problem encountered. (For example, CPU

    speed, Advantech products used, other hardware and software used, etc.) Note anything abnormal and list any on screen messages you get when the problem occurs.

    2. Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.

    3. If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.

    4. Carefully pack the defective product, a fully-completed Repair and Replacement Order Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.

    5. Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.

    Part No. XXXXXXXXXX Edition 1Printed in Taiwan November 2018

    WISE-6610 Series User Manual ii

  • Declaration of ConformityCE

    This product has passed the CE test for environmental specifications. Test conditionsfor passing included the equipment being operated within an industrial enclosure. Inorder to protect the product from being damaged by ESD (Electrostatic Discharge)and EMI leakage, we strongly recommend the use of CE-compliant industrial enclo-sure products.

    FCC Class A

    Note: This equipment has been tested and found to comply with the limits for a ClassA digital device, pursuant to part 15 of the FCC Rules. These limits are designed toprovide reasonable protection against harmful interference when the equipment isoperated in a commercial environment. This equipment generates, uses, and canradiate radio frequency energy and, if not installed and used in accordance with theinstruction manual, may cause harmful interference to radio communications. Opera-tion of this equipment in a residential area is likely to cause harmful interference inwhich case the user will be required to correct the interference at his own expense.

    Technical Support and Assistance1. Visit the Advantech web site at www.advantech.com/support where you can find

    the latest information about the product.2. Contact your distributor, sales representative, or Advantech's customer service

    center for technical support if you need additional assistance. Please have the following information ready before you call:– Product name and serial number– Description of your peripheral attachments– Description of your software (operating system, version, application software,

    etc.)– A complete description of the problem– The exact wording of any error messages

    iii WISE-6610 Series User Manual

  • Warnings, Cautions and Notes

    Document FeedbackTo assist us in making improvements to this manual, we would welcome commentsand constructive criticism. Please send all such - in writing to: [email protected]

    Packing ListBefore setting up the system, check that the items listed below are included and ingood condition. If any item does not accord with the table, please contact your dealerimmediately. 1 x Indsutrial LoRa private gateway 1 x DIN-Rail mounting bracket and screws 1 x Wall-mounting bracket

    Warning! Warnings indicate conditions, which if not observed, can cause personal injury!

    Caution! Cautions are included to help you avoid damaging hardware or losing data. e.g.There is a danger of a new battery exploding if it is incorrectly installed. Do not attempt to recharge, force open, or heat the battery. Replace the battery only with the same or equivalent type recommended by the man-ufacturer. Discard used batteries according to the manufacturer's instructions.

    Note! Notes provide optional additional information.

    WISE-6610 Series User Manual iv

  • Safety Instructions Read these safety instructions carefully. Keep this User Manual for later reference. Disconnect this equipment from any DC outlet before cleaning. Use a damp

    cloth. Do not use liquid or spray detergents for cleaning. For plug-in equipment, the power outlet socket must be located near the equip-

    ment and must be easily accessible. Keep this equipment away from humidity. Put this equipment on a reliable surface during installation. Dropping it or letting

    it fall may cause damage. The openings on the enclosure are for air convection. Protect the equipment

    from overheating. DO NOT COVER THE OPENINGS. Make sure the voltage of the power source is correct before connecting the

    equipment to the power outlet. Position the power cord so that people cannot step on it. Do not place anything

    over the power cord. All cautions and warnings on the equipment should be noted. If the equipment is not used for a long time, disconnect it from the power source

    to avoid damage by transient overvoltage. Never pour any liquid into an opening. This may cause fire or electrical shock. Never open the equipment. For safety reasons, the equipment should be

    opened only by qualified service personnel. If one of the following situations arises, get the equipment checked by service

    personnel:– The power cord or plug is damaged.– Liquid has penetrated into the equipment.– The equipment has been exposed to moisture.– The equipment does not work well, or you cannot get it to work according to

    the user's manual.– The equipment has been dropped and damaged.– The equipment has obvious signs of breakage.

    DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE STORAGE TEMPERATURE MAY GO -40°C (-40°F) ~ 85°C (185°F). THIS COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A CONTROLLED ENVIRONMENT.

    The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A).DISCLAIMER: This set of instructions is given according to IEC 704-1. Advan-tech disclaims all responsibility for the accuracy of any statements containedherein.

    v WISE-6610 Series User Manual

  • Wichtige Sicherheishinweise Bitte lesen sie Sich diese Hinweise sorgfältig durch. Heben Sie diese Anleitung für den späteren Gebrauch auf. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie

    Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.

    Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugän-glich sein.

    Das Gerät ist vor Feuchtigkeit zu schützen. Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen

    oder Fallen könnte Verletzungen hervorrufen. Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor überhit-

    zung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden. Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte. Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es

    sollte auch nichts auf der Leitung abgestellt werden. Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom

    Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.

    Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag aus-lösen.

    Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.

    Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:– Netzkabel oder Netzstecker sind beschädigt.– Flüssigkeit ist in das Gerät eingedrungen.– Das Gerät war Feuchtigkeit ausgesetzt.– Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert

    oder Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.– Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.– Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.

    Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70dB(A) oder weiger.Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend derIEC-704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeitder in diesem Zusammenhang getätigten Aussagen ab.

    WISE-6610 Series User Manual vi

  • Safety Precaution - Static ElectricityStatic electricity can cause bodily harm or damage electronic devices. To avoid dam-age, keep static-sensitive devices in the static-protective packaging until the installa-tion period. The following guidelines are also recommended: Wear a grounded wrist or ankle strap and use gloves to prevent direct contact to

    the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.

    Always disconnect the power from the device before servicing it. Before plugging a cable into any port, discharge the voltage stored on the cable

    by touching the electrical contacts to the ground surface.

    vii WISE-6610 Series User Manual

  • ContentsChapter 1 Product Overview ............................... 1

    1.1 Specifications............................................................................................ 21.2 Hardware Views........................................................................................ 3

    1.2.1 Front View..................................................................................... 31.2.2 Rear View ..................................................................................... 31.2.3 Top View....................................................................................... 31.2.4 System LED Panel........................................................................ 4

    1.3 Dimensions ............................................................................................... 4

    Chapter 2 Gateway Installation ........................... 52.1 Warning..................................................................................................... 62.2 Installation Guideline................................................................................. 72.3 Installing the Gateway............................................................................... 8

    2.3.1 Installing Antenna ......................................................................... 82.3.2 Wall Mounting ............................................................................... 92.3.3 DIN Rain Mounting ..................................................................... 10

    2.4 Connecting the Gateway to Ethernet Port .............................................. 122.4.1 RJ45 Ethernet Cable Wiring ....................................................... 12

    2.5 Power Supply Installation........................................................................ 12

    Chapter 3 Managing Gateway ........................... 133.1 Access Interface ..................................................................................... 143.2 Recommended Practices........................................................................ 15

    3.2.1 Changing Default Password ....................................................... 153.3 Status...................................................................................................... 16

    3.3.1 General ....................................................................................... 163.3.2 Network....................................................................................... 173.3.3 DHCP.......................................................................................... 173.3.4 IPsec........................................................................................... 183.3.5 DynDNS...................................................................................... 183.3.6 System Log................................................................................. 19

    3.4 Configuration........................................................................................... 203.4.1 LAN............................................................................................. 203.4.2 NAT............................................................................................. 283.4.3 OpenVPN.................................................................................... 323.4.4 IPSec .......................................................................................... 353.4.5 GRE............................................................................................ 393.4.6 L2TP ........................................................................................... 413.4.7 PPTP .......................................................................................... 433.4.8 Services ...................................................................................... 443.4.9 Scripts......................................................................................... 523.4.10 Automatic Update ....................................................................... 54

    3.5 Customization ......................................................................................... 563.5.1 Adding a Module......................................................................... 56

    3.6 Administration ......................................................................................... 633.6.1 Users .......................................................................................... 633.6.2 Change Profile ............................................................................ 643.6.3 Change Password ...................................................................... 643.6.4 Set Real Time Clock ................................................................... 653.6.5 Backup Configuration ................................................................. 653.6.6 Restore Configuration................................................................. 65

    SmartSwarm 243 User Manual viii

  • 3.6.7 Update Firmware ........................................................................ 663.6.8 Reboot ........................................................................................ 67

    Chapter 4 Configuration in Typical Situations ...........................................68

    4.1 Enabling the LoRaWAN and Network Server ......................................... 694.2 Changing the Raw LoRa Data Format .................................................... 864.3 Node-RED Setup .................................................................................... 88

    ix SmartSwarm 243 User Manual

  • List of FiguresFigure 1.1 Front View ..................................................................................................................... 3Figure 1.2 Rear View...................................................................................................................... 3Figure 1.3 Top View ....................................................................................................................... 3Figure 1.4 System LED Panel ........................................................................................................ 4Figure 2.1 Installing the Antenna.................................................................................................... 8Figure 2.2 Positioning the Antenna ................................................................................................ 8Figure 2.3 Wall Mount Installation .................................................................................................. 9Figure 2.4 Wall Mount Installation ................................................................................................ 10Figure 2.5 Installing the DIN-Rail Mounting Kit............................................................................. 10Figure 2.6 Correctly Installed DIN Rail Kit .................................................................................... 11Figure 2.7 Removing the DIN-Rail................................................................................................ 11Figure 2.8 Ethernet Plug & Connector Pin Position...................................................................... 12Figure 2.9 Installing the Power Cable........................................................................................... 12Figure 3.1 Login Screen ............................................................................................................... 14Figure 3.2 Changing a Default Password..................................................................................... 15Figure 3.3 Status > General ......................................................................................................... 16Figure 3.4 Status > Network......................................................................................................... 17Figure 3.5 Status > DHCP............................................................................................................ 17Figure 3.6 Status > IPsec ............................................................................................................. 18Figure 3.7 Status > DynDNS ........................................................................................................ 18Figure 3.8 Status > System Log ................................................................................................... 19Figure 3.9 Example Program Syslogd Start with the Parameter -R ............................................. 19Figure 3.10 Configuration > LAN.................................................................................................... 21Figure 3.11 IPv6 Address with Prefix Example .............................................................................. 23Figure 3.12 IPv4 Dynamic DHCP Network Topology ..................................................................... 24Figure 3.13 LAN Configuration for a Dynamic Network Typology .................................................. 25Figure 3.14 IPv4 Dynamic and Static DHCP Network Topology .................................................... 25Figure 3.15 LAN Configuration for an IPv4 Dynamic and Static DHCP Network Topology ........... 26Figure 3.16 IPv6 Dynamic DHCP Server Network Topology ......................................................... 26Figure 3.17 LAN Configuration for an IPv6 Dynamic DHCP Server Network Topology................. 27Figure 3.18 Configuration > NAT.................................................................................................... 28Figure 3.19 Topology for NAT Configuration Example 1................................................................ 30Figure 3.20 NAT Configuration for Example 1................................................................................ 30Figure 3.21 Topology for NAT Configuration Example 2................................................................ 31Figure 3.22 NAT Configuration for Example 2................................................................................ 31Figure 3.23 Configuration > OpenVPN > 1st Tunnel...................................................................... 32Figure 3.24 Topology of OpenVPN Configuration Example ........................................................... 34Figure 3.25 Configuration > 1st Tunnel .......................................................................................... 36Figure 3.26 Topology of Configuration Example ............................................................................ 39Figure 3.27 Configuration > GRE > 1st Tunnel .............................................................................. 40Figure 3.28 Topology of GRE Tunnel Configuration Example ....................................................... 41Figure 3.29 Configuration > L2TP .................................................................................................. 42Figure 3.30 Topology of L2TP Tunnel Configuration Example....................................................... 42Figure 3.31 Configuration > PPTP ................................................................................................. 43Figure 3.32 Topology of PPTP Tunnel Configuration Example...................................................... 44Figure 3.33 Configuration > Services > DynDNS ........................................................................... 45Figure 3.34 DynDNS Configuration Example ................................................................................. 45Figure 3.35 Configuration > Services > HTTP................................................................................ 46Figure 3.36 Configuration > Services > NTP.................................................................................. 46Figure 3.37 Example of NTP Configuration.................................................................................... 47Figure 3.38 Configuration > Services > SNMP............................................................................... 47Figure 3.39 OID Basic Structure..................................................................................................... 49Figure 3.40 SNMP Configuration Example..................................................................................... 50Figure 3.41 MIB Browser Example................................................................................................. 50Figure 3.42 Configuration > Services > SMTP ............................................................................... 51Figure 3.43 SMTP Client Configuration Example........................................................................... 51

    SmartSwarm 243 User Manual x

  • Figure 3.44 Configuration > Services > SSH.................................................................................. 52Figure 3.45 Example of a Startup Script......................................................................................... 53Figure 3.46 Example of IPv6 Up/Down Script ................................................................................ 54Figure 3.47 Configuration > Automatic Update............................................................................... 55Figure 3.48 Example of Automatic Update 1 .................................................................................. 56Figure 3.49 Example of Automatic Update 2 .................................................................................. 56Figure 3.50 User Modules .............................................................................................................. 57Figure 3.51 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN................................... 58Figure 3.52 User Modules > LoRaWAN Gateway > LoRaWAN Status.......................................... 60Figure 3.53 User Modules > LoRaWAN Gateway > LoRaWAN Server ......................................... 61Figure 3.54 User Modules > LoRaWAN Gateway > LoRaWAN Server (https) .............................. 62Figure 3.55 User Modules > LoRaWAN Gateway > Advantech Application .................................. 62Figure 3.56 Administration > Users ................................................................................................ 63Figure 3.57 Administration > Change Profile .................................................................................. 64Figure 3.58 Administration > Change Password ............................................................................ 64Figure 3.59 Administration > Set Real Time Clock ......................................................................... 65Figure 3.60 Administration > Restore Configuration....................................................................... 65Figure 3.61 Administration > Update Firmware .............................................................................. 66Figure 3.62 Administration > Reboot .............................................................................................. 67Figure 4.1 Customization > User Modules.................................................................................... 69Figure 4.2 LoRaWAN Gateway > MQTT and LoRaWAN ............................................................. 69Figure 4.3 LoRaWAN Gateway > MQTT and LoRaWAN ............................................................. 70Figure 4.4 LoRaWAN Gateway > LoRaWAN Server.................................................................... 71Figure 4.5 LoRaWAN Server > Infrastructure > Gateways........................................................... 71Figure 4.6 LoRaWAN Server > Infrastructure > Gateways > Create............................................ 72Figure 4.7 LoRaWAN Server > Infrastructure > Networks............................................................ 72Figure 4.8 LoRaWAN Server > Infrastructure > Network > Create > General.............................. 73Figure 4.9 LoRaWAN Server > Infrastructure > Network > Create > ADR................................... 74Figure 4.10 LoRaWAN Server > Infrastructure > Network > Create > Channel ............................. 75Figure 4.11 LoRaWAN Server > Backends > Handlers.................................................................. 76Figure 4.12 LoRaWAN Server > Backends > Handlers > Create................................................... 77Figure 4.13 Parse Uplink Sample ................................................................................................... 78Figure 4.14 LoRaWAN Server > Backends > Connectors.............................................................. 78Figure 4.15 LoRaWAN Server > Backends > Connectors > Create............................................... 79Figure 4.16 LoRaWAN Server > Devices > Profiles ....................................................................... 80Figure 4.17 LoRaWAN Server > Devices > Profiles > Create > General ....................................... 80Figure 4.18 LoRaWAN Server > Devices > Profiles > Create > ADR ............................................ 81Figure 4.19 LoRaWAN Server > Devices > Activated (Nodes) ...................................................... 82Figure 4.20 LoRaWAN Server > Devices > Activated (Nodes) > Create........................................ 82Figure 4.21 LoRaWAN Server > Devices > Commissioned ........................................................... 83Figure 4.22 LoRaWAN Server > Devices > Commissioned > Create ............................................ 83Figure 4.23 LoRaWAN Server > Received Frames........................................................................ 84Figure 4.24 MQTT Subscription...................................................................................................... 84Figure 4.25 MQTT Subscription...................................................................................................... 85Figure 4.26 LoRaWAN Server > Infrastructure > Events................................................................ 85Figure 4.27 User Modules > LoRaWAN Gateway > Advantech Application .................................. 86Figure 4.28 Data and Status........................................................................................................... 86Figure 4.29 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN................................... 87Figure 4.30 LoRaWAN Server > Activated (Nodes) ....................................................................... 87Figure 4.31 LoRaWAN Server > Activated (Nodes) > Edit > General ............................................ 87Figure 4.32 Applying Data to Other Software Applications............................................................. 88Figure 4.33 Customization > User Modules.................................................................................... 88Figure 4.34 Node-RED ................................................................................................................... 88Figure 4.35 Node-RED ................................................................................................................... 88

    xi SmartSwarm 243 User Manual

  • Chapter 1

    1Product Overview

  • 1.1 SpecificationsSpecifications DescriptionWSN Support Standard LoRaWAN

    Frequency 868/915 MHzANT Connector RP-SMA Female connector x 1

    LAN Interface Ethernet 10/100 Mbps, auto MDI/MDIXConnector RJ45 x 1Protection 1.5-kV built-in magnetic isolation protection

    Digital I/O Port Type Digital input on voltage: 2.7 ~ 36 VDCPort Connector 4-way Molex moni-fit connector

    General LED Indicators PWR, DAT, WAN, ETHReboot Trigger Reset button

    Physical Protection Class IP30Installation DIN rail, wallDimensions (W x H x D)

    150 x 37.5 x 83 mm (5.9" x 1.48" x 3.27")

    Weight 500 g ( 17.63 oz)Environment Operating

    Temperature-40 ~ 75°C (-40 ~ 167°F)

    Storage Temperature

    -40 ~ 85°C (-40 ~ 185°F)

    Ambient Relative Humidity

    10 ~ 95% (non-condensing)

    Power Power Input 9 ~ 36 VDCPower Connector 4-way Molex moni-fit connectorPower Consumption

    3.1/6.6/40 mW (average/peak/sleep mode)

    Certifications EMC EN61000-4-2, Level 3 EN61000-4-3, Level 3 EN61000-4-4, Level 3 EN61000-4-5, Level 3 EN61000-4-6, Level 3 EN61000-4-12, Level 3 EN61000-4-11, voltage dip: 70%

    Shock IEC60068-2-27Free Fall IEC60068-2-32Vibration IEC60068-2-6

    2 WISE-6610 Series User Manual

  • 1.2 Hardware Views

    1.2.1 Front View

    Figure 1.1 Front View

    1.2.2 Rear View

    Figure 1.2 Rear View

    1.2.3 Top View

    Figure 1.3 Top View

    No. Item Description1 System LED panel See “System LED Panel” on page 4 for further details.2 I/O (Power socket) Connect cabling for power.3 ETH port RJ45 x 14 Antenna connector Connector for antenna.

    LoRaETH+-

    PWR

    DAT

    WANWISE-6610I / O

    3 421

    No. Item Description1 DIN-Rail holes Screw holes (2) used in the installation of a DIN rail clip.

    1

    No. Item Description1 Wall mounting holes Screw holes (4) used in the installation on wall.

    1

    1

    1

    1

    WISE-6610 Series User Manual 3

  • 1.2.4 System LED Panel

    1.3 Dimensions

    Figure 1.4 System LED Panel

    LED Name LED Color DescriptionPWR GreenDAT GreenWAN Green

    37.

    50 [1

    .47]

    125.40 [4.94]

    140 [5.51] 150 [5.90]

    83

    [3.2

    6]

    7.5

    0 [0

    .30]

    I / O

    mm [inch]

    4 WISE-6610 Series User Manual

  • Chapter 2

    2Gateway Installation

  • 2.1 WarningWarning: Before working on equipment that is connected to power lines, remove anyjewelry (including rings, necklaces, and watches). Metal objects can heat up whenconnected to power and ground, which can cause serious burns or weld the metalobject to the terminals.

    Caution! Exposure to chemicals can degrade the sealing properties of materials used in the sealed relay device.

    Caution! It is not recommended to work on the system or connect or disconnect cables during periods of lightning activity.

    Caution! Before performing any of the following procedures, disconnect the power source from the DC circuit.

    Caution! Read the installation instructions before connecting the system to its power source.

    Caution! The device must be grounded. Never defeat the ground conductor or operate the equipment in the absence of a suitably installed ground con-ductor.

    Caution! The installation, replacement, or service of the device must be Only be performed by trained and qualified personnel.

    Caution! Ultimate disposal of this product should be handled according to local and national regulations

    6 WISE-6610 Series User Manual

  • 2.2 Installation GuidelineThe following guidelines are provided to optimize the device performance. Reviewthe guidelines before installing the device. Make sure cabling is away from sources of electrical noise. Radios, power lines,

    and fluorescent lighting fixtures can interference with the device performance. Make sure the cabling is positioned away from equipment that can damage the

    cables. Operating environment is within the ranges listed range, see “Specifications” on

    page 2. Relative humidity around the switch does not exceed 95 percent (noncondens-

    ing). Altitude at the installation site is not higher than 10,000 feet. In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch

    to connected devices can not exceed 100 meters (328 feet). Make sure airflow around the switch and respective vents is unrestricted. With-

    out proper airflow the switch can overheat. To prevent performance degredation and damage to the switch, make sure there is clerance at the top and bottom and around the exhaust vents.

    Caution! To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 70°C (158°F).

    Caution! If the switch is to be installed in a hazardous location, ensure that the DC power source is located away from the vicinity of the switch.

    Caution! The installation of the equipment must comply with all national and local electrical codes.

    Caution! Explosion Hazard-The area must be known to be nonhazardous before servicing or replacing any components.

    Warning! Airflow around the switch must be unrestricted. To prevent the switch from overheating, there must be the following minimum clearances: Top and bottom: 2.0 in. (50.8 mm) Sides: 2.0 in. (50.8 mm) Front: 2.0 in. (50.8 mm)

    WISE-6610 Series User Manual 7

  • 2.3 Installing the Gateway2.3.1 Installing Antenna

    1. Connect the antenna by screwing the antenna connectors in a clockwise direc-tion.

    Figure 2.1 Installing the Antenna2. Position the antenna for optimal signal strength.

    Figure 2.2 Positioning the Antenna

    Note! The location and position of the antenna is crucial for effective wireless connectivity

    LoRa

    ETH

    +-PW

    RDAT

    I / O

    WAN

    WISE-66

    10

    LoRa

    ETH

    +-PW

    RDAT

    I / O

    WAN

    WISE-66

    10

    8 WISE-6610 Series User Manual

  • 2.3.2 Wall Mounting1. Locate the area to install and mark the four screw locations. It is suggested to

    place the device on the installation location and use the mounting locations to mark the location of the screw holes).

    2. If necessary first drill pilot holes. Drill four holes over the four marked locations on the wall. On concrete, it is recommended to install wall sinks

    3. Align the SmartSwarm over the installation location on the wall.4. Secure the SmartSwarm with screws (Ø 5.0 mm).

    Figure 2.3 Wall Mount Installation

    LoRaETH

    +-

    PWR DAT

    I / OWAN

    WISE-6610

    WISE-6610 Series User Manual 9

  • 2.3.3 DIN Rain Mounting2.3.3.1 Installing the DIN Rail Mounting Kit

    1. Align the DIN rail clip with the rear of SmartSwarm.2. Secure the DIN rail clip and the SmartSwarm with screws.

    Figure 2.4 Wall Mount Installation3. Position the rear panel of the SmartSwarm directly in front of the DIN rail, mak-

    ing sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.Make sure the DIN rail is inserted behind the spring mechanism.

    4. Once the DIN rail is seated correctly in the DIN rail clip, press the front of the SmartSwarm to rotate the SmartSwarm down and into the release tab on the DIN rail clip. If seated correctly, the bottom of the DIN rail should be fully inserted in the release tab.

    Figure 2.5 Installing the DIN-Rail Mounting Kit

    DIN rail clip

    DIN rail

    DIN rail clip release tab

    10 WISE-6610 Series User Manual

  • See the following figure demonstrating the correct position of a completed DINinstallation.

    Figure 2.6 Correctly Installed DIN Rail Kit

    2.3.3.2 Removing the DIN Rail Mounting Kit1. Ensure that power is removed from the SmartSwarm, and disconnect all cables

    and connectors from the front panel of the SmartSwarm.2. Push down on the top of the DIN rail clip release tab with your finger. As the clip

    releases, lift the bottom of the SmartSwarm, as shown in the following illustra-tion.

    Figure 2.7 Removing the DIN-Rail

    WISE-6610 Series User Manual 11

  • 2.4 Connecting the Gateway to Ethernet Port2.4.1 RJ45 Ethernet Cable Wiring

    For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is rec-ommended. The connector bodies on the RJ45 Ethernet ports are metallic and con-nected to the GND terminal. For best performance, use shielded cabling. Shieldedcabling may be used to provide further protection.

    Figure 2.8 Ethernet Plug & Connector Pin PositionMaximum cable length: 100 meters (328 ft.) for 10/100BaseT.

    2.5 Power Supply Installation1. Insert the power cable into the power socket. The cable locks in place if installed

    correctly.2. Connect the other end to a wall outlet.

    The LEDs light when the device is connected to the power source

    Figure 2.9 Installing the Power CableThe following table show the color lines definition:

    Straight-thru Cable Wiring Cross-over Cable WiringPin 1 Pin 1 Pin 1 Pin 3Pin 2 Pin 2 Pin 2 Pin 6Pin 3 Pin 3 Pin 3 Pin 1Pin 6 Pin 6 Pin 6 Pin 2

    1

    8

    V+ DI GND D0Red Yellow Black Gray

    LoRa

    ETH

    +-PWR

    DAT

    I / O

    WAN

    WISE-66

    10

    12 WISE-6610 Series User Manual

  • Chapter 3

    3Managing Gateway

  • 3.1 Access InterfaceTo access the login window, connect the device to the network, see “Connecting theGateway to Ethernet Port” on page 12. When WISE-6610 Series is first installed,make sure the network environment is configured to enable access to the device.Your computer and the device must be on the same network subnet to allow them toestablish a network connection.Before you begin, make sure the device is powered on, see “Power SupplyInstallation” on page 13 for further information.1. Launch a web browser on a computer.2. In the browser's address bar type in the default IP address (192.168.1.1). The

    login screen displays.3. Enter the default user name and password (root/root) to log into the

    management interface. You can change the default password after a successfully log in. See “Changing Default Password” on page 15.

    4. Click Login to enter the management interface.

    Figure 3.1 Login ScreenWhen you successfully enter login information on the login page, web interface willbe displayed. The left side of the web interface contains a menu tree with sections formonitoring (Status), configuration (Configuration), customization (Customization) andadministration (Administration) of the device.Name and Location items in the right upper corner display the name and location ofthe device in the SNMP configuration (see “SNMP” on page 47). These fields areuser-defined for each device.After the green LED starts to blink you may restore the initial device settings bypressing the reset (RST) button on the back panel. If the reset button is pressed, allconfiguration will revert to factory defaults and the device will reboot (the green LEDwill be on during the reboot).

    14 WISE-6610 Series User Manual

  • 3.2 Recommended PracticesOne of the easiest things to do to help increase the security posture of the networkinfrastructure is to implement a policy and standard for secure management. Thispractice is an easy way to maintain a healthy and secure network.After you have performed the basic configurations on your switches, the following is arecommendation which is considered best practice policy.

    3.2.1 Changing Default PasswordIn keeping with good management and security practices, it is recommended thatyou change the default password as soon as the WISE-6610 Series is functioningand setup correctly. The following details the necessary steps to change the defaultpassword.To change the password:1. Navigate to Administration > Change Password.2. In the New Password field, type in the new password. Re-type the same

    password in the Confirm Password field.3. Click Apply to change the current account settings.

    Figure 3.2 Changing a Default Password

    Note! To change other user's password, go to Administration > User. From the User Administration menu, click Change Password behind the user's account

    WISE-6610 Series User Manual 15

  • 3.3 Status3.3.1 General

    Selecting the General item will open a screen displaying a summary of basicinformation about the device and its activities. This page is also displayed when youlogin to the web interface. Information is divided into several sections, based uponthe type of device activity or the properties area: Mobile Connection, Primary LAN,Peripheral Ports and System Information. If the device is WiFi equipped, there will bea WiFi section.IPv6 Address item can show multiple different addresses for one network interface.This is standard behavior since an IPv6 interface uses more addresses. The secondIPv6 Address showed after pressing More Information is automatically generatedEUI-64 format link local IPv6 address derived from MAC address of the interface. It isgenerated and assigned the first time the interface is used (e.g. cable is connected,Mobile WAN connecting, etc.).To access this page, click Status > General.

    Figure 3.3 Status > General

    16 WISE-6610 Series User Manual

  • 3.3.2 NetworkTo view information about the interfaces and the routing table, open the Network itemin the Status menu.To access this page, click Status > Network.

    Figure 3.4 Status > Network

    3.3.3 DHCPInformation about the DHCP server activity is accessible via DHCP item. The DHCPserver provides automatic configuration of the client devices connected to the device.The DHCP server assigns each device an IP address, subnet mask, default gateway(IP address of device) and DNS server (IP address of device). DHCPv6 server issupported.To access this page, click Status > DHCP.

    Figure 3.5 Status > DHCP

    WISE-6610 Series User Manual 17

  • 3.3.4 IPsecSelecting the IPsec option in the status menu of the web page will bring up the infor-mation for any IPsec Tunnels that have been established. If the tunnel has been builtcorrectly, the screen will display IPsec SA established (highlighted in red in the figurebelow.) If there is no such text in log, the tunnel was not created.To access this page, click Status > IPsec.

    Figure 3.6 Status > IPsec

    3.3.5 DynDNSThe device supports DynamicDNS using a DNS server on www.dyndns.org. IfDynamic DNS is configured, the status can be displayed by selecting menu optionDynDNS. Refer to www.dyndns.org for more information on how to configure aDynamic DNS client.You can use the following listed servers for the Dynamic DNS service. It is possible touse the DynDNSv6 service with IP Mode switched to IPv6 on DynDNS Configurationpage. www.dyndns.org www.spdns.de www.dnsdynamic.org www.noip.comTo access this page, click Status > DynDNS.

    Figure 3.7 Status > DynDNSWhen the device detects a DynDNS record update, the dialog displays one or moreof the following messages: DynDNS client is disabled. Invalid username or password. Specified hostname doesn't exist. Invalid hostname format. Hostname exists, but not under specified username. No update performed yet. DynDNS record is already up to date. DynDNS record successfully update. DNS error encountered. DynDNS server failure.

    18 WISE-6610 Series User Manual

  • 3.3.6 System LogIf there are any connection problems you may view the system log by selecting theSystem Log menu item. Detailed reports from individual applications running in thedevice will be displayed. Use the Save Log button to save the system log to aconnected computer. (It will be saved as a text file with the .log extension.) The SaveReport button is used for creating detailed reports. (It will be saved as a text file withthe .txt extension. The file will include statistical data, routing and process tables,system log, and configuration.)The default length of the system log is 1000 lines. After reaching 1000 lines a new fileis created for storing the system log. After completion of 1000 lines in the second file,the first file is overwritten with a new file.The Syslogd program will output the system log. It can be started with two options tomodify its behavior. Option “-S” followed by decimal number sets the maximalnumber of lines in one log file. Option “-R” followed by hostname or IP addressenables logging to a remote syslog daemon. (If the remote syslog daemon is LinuxOS, there has to be remote logging enabled (typically running “syslogd -R”). If it's theWindows OS, there has to be syslog server installed, e.g. Syslog Watcher). To startsyslogd with these options, the “/etc/init.d/syslog” script can be modified via SSH orlines can be added into Startup Script (accessible in Configuration section) accordingto Figure 3.9.To access this page, click Status > System Log.

    Figure 3.8 Status > System LogThe following example (figure) shows how to send syslog information to a remoteserver at 192.168.2.115 on startup.

    Figure 3.9 Example Program Syslogd Start with the Parameter -R

    WISE-6610 Series User Manual 19

  • 3.4 Configuration3.4.1 LAN

    To enter the Local Area Network configuration, select the LAN menu item in theConfiguration section.LAN Configuration page is divided into IPv4 and IPv6 columns, see Figure 3.10.There is dual stack support of IPv4 and IPv6 protocols - they can run alongside, youcan configure either one of them or both. If you configure both IPv4 and IPv6, othernetwork devices will choose the communication protocol. Configuration items andIPv6 to IPv4 differences are described in the tables below.

    20 WISE-6610 Series User Manual

  • To access this page, click Configuration > LAN.

    Figure 3.10 Configuration > LAN

    Item DescriptionDHCP Client Enables/disables the DHCP client function supporting both IPv4 and

    IPv6. disabled - The device does not allow automatic allocation of an

    IP address from a DHCP server in LAN network. enabled - The device allows automatic allocation of an IP

    address from a DHCP server in LAN network.IP Address A fixed IP address of the Ethernet interface. Use IPv4 notation in IPv4

    column and IPv6 notation in IPv6 column. Shortened IPv6 notation is supported.

    Subnet Mask / Prefix Specifies a Subnet Mask for the IPv4 address. In the IPv6 column, fill in the Prefix for the IPv6 address - number in range 0 to 128.

    WISE-6610 Series User Manual 21

  • The Default Gateway and DNS Server items are only used if the DHCP Client item isset to disabled and if the Primary or Secondary LAN is selected by the BackupRoutes system as the default route. Since FW 5.3.0, Default Gateway and DNSServer are also supported on bridged interfaces.The following items (in the table below) are global for the configured Ethernetinterface. Only one bridge can be active on the device at a time. The DHCP Client, IPAddress and Subnet Mask / Prefix parameters of the only one of the interfaces areused to for the bridge. Primary LAN has higher priority when other interfaces (wlan0)are added to the bridge. Other interfaces (wlan0 - wifi) can be added to or deletedfrom an existing bridge at any time. The bridge can be created on demand for suchinterfaces, but not if it is configured by their respective parameters.

    3.4.1.1 DHCP ServerThe DHCP server assigns the IP address, gateway IP address (IP address of thedevice) and IP address of the DNS server (IP address of the device) to the connectedclients. If these values are filled in by the user in the configuration form, they will bepreferred.The DHCP server supports static and dynamic assignment of IP addresses. DynamicDHCP assigns clients IP addresses from a defined address space. Static DHCPassigns IP addresses that correspond to the MAC addresses of connected clients.If IPv6 column is filled in, the DHCPv6 server is used - it is dual stack IPv4 and IPv6.

    Default Gateway Specifies the IP address of a default gateway. If filled-in, every packet with the destination not found in the routing table is sent to this IP address. Use proper IP address notation in IPv4 and IPv6 column.

    DNS Server Specifies the IP address of the DNS server. When the IP address is not found in the Routing Table, the device forwards the request to DNS server specified here. Use proper IP address notation in IPv4 and IPv6 column.

    Item DescriptionBridged Activates/deactivates the bridging function on the device.

    no - The bridging function is inactive (default). yes - The bridging function is active.

    Media Type Specifies the type of duplex and speed used in the network. Auto-negation - The device automatically sets the best speed

    and duplex mode of communication according to the network's possibilities.

    100 Mbps Full Duplex - The device communicates at 100 Mbps, in the full duplex mode.

    100 Mbps Half Duplex - The device communicates at 100 Mbps, in the half duplex mode.

    10 Mbps Full Duplex - The device communicates at 10 Mbps, in the full duplex mode.

    10 Mbps Half Duplex - The device communicates at 10 Mbps, in the half duplex mode.

    Item Description

    Note! Do not to overlap ranges of static allocated IP addresses with addresses allocated by the dynamic DHCP server. IP address conflicts and incorrect network function can occur if you overlap the ranges.

    22 WISE-6610 Series User Manual

  • Configuration of Dynamic DHCP Server

    Configuration of Static DHCP Server

    3.4.1.2 IPv6 Prefix Delegation

    If you want to override the automatic IPv6 prefix delegation, you can configure it inthis form. You have to know your Subnet ID Width (part of IPv6 address), seeFigure 3.11 below for the calculation help - it is an example: 48 bits is Site Prefix, 16bits is Subnet ID (Subnet ID Width) and 64 bits is Interface ID.

    Figure 3.11 IPv6 Address with Prefix Example

    Item DescriptionEnable dynamic DHCP leases

    Select this option to enable a dynamic DHCP server.

    IP Pool Start Starting IP addresses allocated to the DHCP clients. Use proper notation in IPv4 and IPv6 column.

    IP Pool End End of IP addresses allocated to the DHCP clients. Use proper IP address notation in IPv4 and IPv6 column.

    Lease time Time in seconds that the IP address is reserved before it can be re-used.

    Item DescriptionEnable static DHCP leases

    Select this option to enable a static DHCP server.

    MAC Address MAC address of a DHCP client.IPv4 Address Assigned IPv4 address. Use proper notation.IPv6 Address Assigned IPv6 address. Use proper notation.

    Note! This is an advanced configuration option. IPv6 prefix delegation works automatically with DHCPv6 - use only if different configuration is desired and if you know the consequences.

    Item DescriptionEnable IPv6 prefix delegation

    Enables prefix delegation configuration filled-in below.

    Enable IPv6 prefix delegation

    The decimal value of the Subnet ID of the Ethernet interface. Maximum value depends on the Subnet ID Width.

    Subnet ID Width The maximum Subnet ID Width depends on your Site Prefix - it is the remainder to 64 bits.

    WISE-6610 Series User Manual 23

  • 3.4.1.3 IEEE 802.1X AuthenticationTo prevent unauthorized radios from accessing data transmitting over wirelesstransmission, WISE-6610 Series provides rock solid security settings.Navigate to Configuration > LAN and locate Enable IEEE 802.1X Authentication.

    The following are LAN configuration illustrations defining possible network topology.Example 1: IPv4 Dynamic DHCP Server, Default Gateway and DNS Server The range of dynamic allocated IPv4 addresses is from 192.168.1.2 to

    192.168.1.4. The address is allocated for 600 second (10 minutes). Default gateway IP address is 192.168.1.20 DNS server IP address is 192.168.1.20

    Figure 3.12 IPv4 Dynamic DHCP Network Topology

    Item DescriptionEnable IEEE 802.1X Authentication

    Tick the radio button to enable the authentication function.

    Authentication Method

    Click the drop-down menu to select the method type. Range: EAP-PEAP/MSCHAPv2 or EAP-TLS.

    CA Certificate Enter the trusted digital certificate (required for EAP-PEAP).Local Certificate Enter the self-signed digital certificate (required for EAP-PEAP).Local Private Key Enter the secret key variable used to encrypt or decrypt the

    transmission.Identity Enter the Identity profile authorized to access the authentication

    server.Password Enter the string associated with the defined Identity profile in the

    previous frame.Apply Click Apply to accept the configuration changes.

    24 WISE-6610 Series User Manual

  • The settings required in the LAN configuration menu for an IPv4 Dynamic DHCPconfiguration are shown in the following figure.

    Figure 3.13 LAN Configuration for a Dynamic Network TypologyExample 2: IPv4 Dynamic and Static DHCP server The range of allocated addresses is from 192.168.1.2 to 192.168.1.4. The address is allocated for 600 seconds (10 minutes). The client with the MAC address 01:23:45:67:89:ab has the IP address

    192.168.1.10. The client with the MAC address 01:54:68:18:ba:7e has the IP address

    192.168.1.11.

    Figure 3.14 IPv4 Dynamic and Static DHCP Network Topology

    WISE-6610 Series User Manual 25

  • The settings required in the LAN configuration menu for an IPv4 Dynamic and StaticDHCP configuration are shown in the following figure.

    Figure 3.15 LAN Configuration for an IPv4 Dynamic and Static DHCP Network Topology

    Example 3: IPv6 Dynamic DHCP Server The range of dynamic allocated IPv6 addresses is from 2001:db8::1 to

    2001:db8::ffff. The address is allocated for 600 second (10 minutes). The device is still accessible via IPv4 (192.168.1.1).

    Figure 3.16 IPv6 Dynamic DHCP Server Network Topology

    26 WISE-6610 Series User Manual

  • Figure 3.17 LAN Configuration for an IPv6 Dynamic DHCP Server Network Topology

    WISE-6610 Series User Manual 27

  • 3.4.2 NATTo configure the address translation function, click on NAT in the Configuration sec-tion of the main menu. There is independent IPv4 and IPv6 NAT configuration sincethere is dual stack IPv4 and IPv6 implemented in the router. The NAT item in themenu on the left will expand to IPv4 and IPv6 options and you can click IPv6 toenable and configure the IPv6 NAT - see Figure below. The configuration fields havethe same meaning in the IPv4 NAT Configuration and IPv6 NAT Configuration forms.To access this page, click Configuration > NAT.

    Figure 3.18 Configuration > NATThe router actually uses Port Address Translation (PAT), which is a method of map-ping a TCP/UDP port to another TCP/UDP port. The router modifies the informationin the packet header as the packets traverse a router. This configuration form allowsyou to specify up to 16 PAT rules.

    Item DescriptionPublic Port Public port for the translation rule.Private Port Private port for the translation rule.Type Protocol type - TCP or UDP.Server IP Address IP address where the router forwards incoming data.

    28 WISE-6610 Series User Manual

  • If you require more than sixteen NAT rules, insert the remaining rules into the StartupScript. The Startup Script dialog is located on Scripts page in the Configuration sec-tion of the menu. When creating your rules in the Startup Script, use this commandfor IPv4 NAT:

    Enter the IP address [IPADDR], the public ports numbers [PORT_PUBLIC], and pri-vate [PORT_PRIVATE] in place of square brackets. For IPv6 NAT use ip6tables com-mand with same options.If you enable the following options and enter the port number, the router allows you toremotely access to the router from WAN (Mobile WAN) interface.

    Use the following parameters to set the routing of incoming data from the WAN(Mobile WAN) to a connected computer.

    iptables -t nat -A napt -p tcp -dport [PORT_PUBLIC] -j DNAT-to-destination [IPADDR]:[PORT_PRIVATE]

    Caution! Enable remote HTTP access on port activates the redirect from HTTP to HTTPS protocol only. The router doesn't allow unsecured HTTP proto-col to access the web configuration. To access the web configuration, always check the Enable re- mote HTTPS access on port item. Never enable the HTTP item only to access the web configuration from the Internet (configuration would not be accessible from the Internet). Always check the HTTPS item or HTTPS and HTTP items together (to set the redirect from HTTP).

    Item DescriptionEnable remote HTTP access on port

    This option sets the redirect from HTTP to HTTPS only (disabled in default configuration).

    Enable remote HTTPS access on port

    If field and port number are filled in, configuration of the router over web interface is allowed (disabled in default configuration).

    Enable remote SSH access on port

    Select this option to allow access to the router using SSH (disabled in default configuration).

    Enable remote SNMP access on port

    Select this option to allow access to the router using SNMP (disabled in default configuration).

    Masquerade outgoing packets

    Activates/deactivates the network address translation function.

    Item DescriptionSend all remaining incoming packets to default server

    Activates/deactivates forwarding unmatched incoming packets to the default server. The prerequisite for the function is that you specify a default server in the De- fault Server IPv4/IPv6 Address field. The router can for- ward incoming data from a GPRS to a computer with the assigned IP address.

    Default Server IP Address

    The IP address.

    WISE-6610 Series User Manual 29

  • Example1: IPv4 NAT Configuration with Single Device Connected

    Figure 3.19 Topology for NAT Configuration Example 1It is important to mark the Send all remaining incoming packets to default servercheck box for this configuration. The IP address in this example is the address of thedevice behind the router. The default gateway of the devices in the subnetwork con-nected to router is the same IP address as displayed in the Default Server IPv4Address field.

    Figure 3.20 NAT Configuration for Example 1Example 2: IPv4 NAT Configuration with More Equipment ConnectedIn this example, using the switch you can connect more devices behind the router.Every device connected behind the router has its own IP address. Enter the addressin the Server IPv4 Address field in the NAT dialog. The devices are communicatingon port 80, but you can set port forwarding using the Public Port and Private Portfields in the NAT dialog. You have now configured the router to access the192.168.1.2:80 socket behind the router when accessing the IP address 10.0.0.1:81from the Internet. If you send a ping request to the public IP address of the router(10.0.0.1), the router responds as usual (not forwarding). And since the Send all

    30 WISE-6610 Series User Manual

  • remaining incoming packets to default server is inactive, the router denies connectionattempts.

    Figure 3.21 Topology for NAT Configuration Example 2

    Figure 3.22 NAT Configuration for Example 2

    WISE-6610 Series User Manual 31

  • 3.4.3 OpenVPNSelect the OpenVPN item to configure an OpenVPN tunnel. The OpenVPN tunnelfunction allows you to create a secure connection between two separate LANnetworks. The device allows you to create up to four OpenVPN tunnels. IPv4 andIPv6 dual stack is supported.To access this page, click Configuration > OpenVPN.

    Figure 3.23 Configuration > OpenVPN > 1st Tunnel

    Item DescriptionDescription Specifies the description or name of tunnel.

    32 WISE-6610 Series User Manual

  • Protocol Specifies the communication protocol. UDP - The OpenVPN communicates using UDP. TCP server - The OpenVPN communicates using TCP in server

    mode. TCP client - The OpenVPN communicates using TCP in client

    mode. UDPv6 - The OpenVPN communicates using UDP over IPv6. TCPv6 server - The OpenVPN communicates using TCP over

    IPv6 in server mode. TCPv6 client - The OpenVPN communicates using TCP over

    IPv6 in client mode.UDP Port Specifies the port of the relevant protocol (UDP or TCP).Remote IP Address Specifies the IPv4, IPv6 address or domain name of the opposite side

    of the tunnel.Remote Subnet IPv4 address of a network behind opposite side of the tunnel.Remote Subnet Mask

    IPv4 subnet mask of a network behind opposite tunnel's side.

    Redirect Gateway Activates/deactivates redirection of data on Layer 2.Local Interface IP Address

    Specifies the IPv4 address of a local interface. For proper routing it is recommended to fill-in any IPv4 address from local range even if you are using IPv6 tunnel only.

    Remote Interface IP Address

    Specifies the IPv4 address of the interface of opposite side of the tunnel. For proper routing it is recommended to fill-in any IPv4 address from local range even if you are using IPv6 tunnel only.

    Remote IPv6 Subnet Specify the subnet associated with the listed remote interface. Remote IPv6 Subnet Prefix Length

    IPv6 address and prefix of the remote IPv6 network. Equivalent of the Remote Subnet and Remote Subnet Mask in IPv4 section.

    Local Interface IPv6 Address

    Specifies the IPv6 address of a local interface.

    Remote Interface IPv6 Address

    Specifies the IPv6 address of the interface of opposite side of the tunnel.

    Ping Interval Specifies the IPv6 address of the interface of opposite side of the tunnel.

    Ping Timeout Specifies the time interval the device waits for a message sent by the opposite side. For proper verification of the OpenVPN tunnel, set the Ping Timeout to greater than the Ping Interval.

    Renegotiate Interval Specifies the renegotiate period (reauthorization) of the OpenVPN tunnel. You can only set this parameter when the Authenticate Mode is set to username/password or X.509 certificate. After this time period, the device changes the tunnel encryption to help provide the continues safety of the tunnel.

    Max Fragment Size Maximum size of a sent packet.Compression Compression of the data sent:

    none - No compression is used. LZO - A lossless compression is used, use the same setting on

    both sides of the tunnel.NAT Rules Activates/deactivates the NAT rules for the OpenVPN tunnel:

    not applied - NAT rules are not applied to the tunnel. applied - NAT rules are applied to the OpenVPN tunnel.

    Item Description

    WISE-6610 Series User Manual 33

  • Example: OpenVPN Tunnel Configuration in IPv4 Network

    Figure 3.24 Topology of OpenVPN Configuration ExampleOpenVPN tunnel configuration:

    Authenticate Mode Specifies the authentication mode: none - No authentication is set. Pre-shared secret - Specifies the shared key function for both

    sides of the tunnel. Username/password - Specifies authentication using a CA

    Certificate, Username and Password. X.509 Certificate (multiclient) - Activates the X.509

    authentication in multi-client mode. X.509 Certificate (client) - Activates the X.509 authentication in

    client mode. X.509 Certificate (server) - Activates the X.509 authentication in

    server mode.Pre-shared Secret Specifies the pre-shared secret which you can use for every

    authentication mode.CA Certificate Specifies the CA Certificate which you can use for the username/

    password and X.509 Certificate authentication modes.DH Parameters Specifies the protocol for the DH parameters key exchange which you

    can use for X.509 Certificate authentication in the server mode.Local Certificate Specifies the certificate used in the local device. You can use this

    authentication certificate for the X.509 Certificate authentication mode.

    Local Private Key Specifies the key used in the local device. You can use the key for the X.509 Certificate authentication mode.

    Username Specifies a login name which you can use for authentication in the username/password mode.

    Password Specifies a password which you can use for authentication in the username/password mode.

    Extra Options Specifies additional parameters for the OpenVPN tunnel, such as DHCP options. The parameters are proceeded by two dashes. For possible parameters see the help text in the device using SSH - run the openvpnd --help command.

    Configuration A BProtocol UDP UDPUDP Port 1194 1194

    Item Description

    34 WISE-6610 Series User Manual

  • Examples of different options for configuration and authentication of OpenVPN tunnelcan be found in the application note OpenVPN Tunnel [5].

    3.4.4 IPSecTo open the Tunnel Configuration page, click in the Configuration section of the mainmenu. The tunnel function allows you to create a secured connection between twoseparate LAN networks. The device allows you to create up to four tunnels. IPv4 andIPv6 tunnels are supported (dual stack), you can transport IPv6 traffic through IPv4tunnel and vice versa.To access this page, click Configuration > IPSec.

    Remote IP Address 10.0.0.2 10.0.0.1Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Local Interface IP Address 19.16.1.0 19.16.2.0Remote Interface IP Address 19.16.2.0 19.16.1.0Compression LZO LZOAuthenticate mode none none

    Configuration A B

    Note! To encrypt data between the local and remote subnets, specify the appropriate values in the subnet fields on both devices. To encrypt the data stream between the devices only, leave the local and remote subnets fields blank.

    Note! If you specify the protocol and port information in the Local Protocol/Port field, then the device encapsulates only the packets matching the settings.

    WISE-6610 Series User Manual 35

  • Figure 3.25 Configuration > 1st Tunnel

    36 WISE-6610 Series User Manual

  • Item DescriptionDescription Name or description of the tunnel.Host IP Mode IPv4 - The device communicates via IPv4 with the opposite side

    of the tunnel. IPv6 - The device communicates via IPv4 with the opposite side

    of the tunnel.Remote IP Address IPv4, IPv6 address or domain name of the remote side of the tunnel,

    based in the Host IP Mode above.Tunnel IP Mode IPv4 - The IPv4 communication runs inside the tunnel.

    IPv6 - The IPv6 communication runs inside the tunnel.Remote ID Identifier (ID) of remote side of the tunnel. It consists of two parts: a

    hostname and a domain-name.Remote Subnet IPv4 or IPv6 address of a network behind remote side of the tunnel,

    based on Tunnel IP Mode above.Remote Subnet Mask

    IPv4 subnet mask of a network behind remote side of the tunnel, or IPv6 prefix (single number 0 to 128).

    Remote Protocol/Port

    Specifies Protocol/Port of remote side of the tunnel. The general form is protocol /port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.

    Local ID Identifier (ID) of local side of the tunnel. It consists of two parts: a hostname and a domain-name.

    Local Subnet IPv4 or IPv6 address of a local network, based on Tunnel IP Mode above.

    First Local Subnet Mask

    IPv4 subnet mask of a local network, or IPv6 prefix (single number 0 to 128).

    Local Protocol/Port Specifies Protocol/Port of a local network. The general form is protocol /port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.

    Encapsulation Mode Specifies the mode, according to the method of encapsulation. You can select the tunnel mode in which the entire IP datagram is encapsulated or the transport mode in which only IP header is encapsulated.

    Force NAT Traversal Enable/disables NAT address translation on the tunnel. Enable if you use NAT between the end points of the tunnel.

    IKE Protocol Click the drop-down menu to select to define a protocol (IKEv1/IKEv2, IKEv1, or IKEv2). IKE Phase 1 is ISAKMP (Internet Security Association and Key Management Protocol), which is used to create private tunnelling between peers for a secure communication.

    IKE Mode Specifies the mode for establishing a connection (main or aggressive). If you select the aggressive mode, then the device establishes the tunnel faster, but the encryption is permanently set to 3DES-MD5. We recommend that you not use the aggressive mode due to lower security!

    IKE Algorithm Specifies the means by which the device selects the algorithm: auto - The encryption and hash algorithm are selected

    automatically. manual - The encryption and hash algorithm are defined by the

    user.IKE Encryption Encryption algorithm - 3DES, AES128, AES192, AES256.IKE Hash Hash algorithm - MD5, SHA1, SHA256, SHA384 or SHA512.

    WISE-6610 Series User Manual 37

  • The function supports the following types of identifiers (ID) for both sides of thetunnel, Remote ID and Local ID parameters: IP address (for example, 192.168.1.1) DN (for example, C=CZ, O=CompanyName, OU=TP, CN=A) FQDN (for example, @director.companyname.cz) - the @ symbol proceeds the

    FQDN. User FQDN (for example, [email protected])The certificates and private keys have to be in the PEM format. Use only certificatescontaining start and stop tags.The random time, after which the device re-exchanges new keys is defined asfollows:

    IKE DH Group Specifies the Diffie-Hellman groups which determine the strength of the key used in the key exchange process. Higher group numbers are more secure, but require more time to compute the key.

    ESP Algorithm Specifies the means by which the device selects the algorithm: auto - The encryption and hash algorithm are selected

    automatically. manual - The encryption and hash algorithm are defined by the

    user.ESP Encryption Encryption algorithm - DES, 3DES, AES128, AES192, AES256.ESP Hash Hash algorithm - MD5, SHA1, SHA256, SHA384 or SHA512.PFS Enables/disables the Perfect Forward Secrecy function. The function

    ensures that derived session keys are not compromised if one of the private keys is compromised in the future.

    PFS DH Group Specifies the Diffie-Hellman group number (see IKE DH Group).Key Lifetime Lifetime key data part of tunnel. The minimum value of this parameter

    is 60 s. The maximum value is 86400 s.IKE Lifetime Lifetime key service part of tunnel. The minimum value of this

    parameter is 60 s. The maximum value is 86400 s.Rekey Margin Specifies how long before a connection expires that the device

    attempts to negotiate a replacement. Specify a maximum value that is less than half of IKE and Key Lifetime parameters.

    Rekey Fuzz Percentage of time for the Rekey Margin extension.DPD Delay Time after which the tunnel functionality is tested.DPD Timeout The period during which device waits for a response.Authenticate Mode Specifies the means by which the device authenticates:

    Pre-shared key - Sets the shared key for both sides of the tunnel.

    X.509 Certificate - Allows X.509 authentication in multiclient mode.

    Pre-shared Key Specifies the shared key for both sides of the tunnel. The prerequisite for entering a key is that you select pre-shared key as the authentication mode.

    CA Certificate Certificate for X.509 authentication.Remote Certificate Certificate for X.509 authentication.Local Certificate Certificate for X.509 authentication.Local Private Key Private key for X.509 authentication.Local Passphrase Passphrase used during private key generation.Debug Choose the level of verbosity to System Log. Silent (default), audit,

    control, control-more, raw, private (most verbose including the private keys). See strongSwan documentation for more details.

    Item Description

    38 WISE-6610 Series User Manual

  • Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin *Rekey Fuzz/100))

    The default exchange of keys is in the following time range: Minimal time: 1h - (9m + 9m) = 42m Maximal time: 1h - (9m + 0m) = 51mWe recommend that you maintain the default settings. When you set key exchangetimes higher, the tunnel produces lower operating costs, but the setting also providesless security. Conversely, when you reducing the time, the tunnel produces higheroperating costs, but provides for higher security.The changes in settings will apply after clicking the Apply button.Example: Tunnel Configuration in IPv4 Network

    Figure 3.26 Topology of Configuration Example tunnel configuration:

    Examples of different options for configuration and authentication of tunnel can befound in the application note Tunnel [6].

    3.4.5 GRE

    To open the GRE Tunnel Configuration page, click GRE in the Configuration sectionof the main menu. The GRE tunnel function allows you to create an unencrypted

    Configuration A BHost IP Mode IPv4 IPv4Remote IP Address 10.0.0.2 10.0.0.1Tunnel IP Mode IPv4 IPv4Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Local Subnet 192.168.1.0 192.168.2.0Local Subnet Mask 255.255.255.0 255.255.255.0Authenticate mode pre-shared key pre-shared keyPre-shared key test test

    Note! GRE is an unencrypted protocol. GRE via IPv6 is not supported.

    WISE-6610 Series User Manual 39

  • connection between two separate LAN networks. The device allows you to createfour GRE tunnels.To access this page, click Configuration > GRE.

    Figure 3.27 Configuration > GRE > 1st Tunnel

    The changes in settings will apply after pressing the Apply button.

    Item DescriptionDescription Description of the GRE tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet IP address of the network behind the remote side of the tunnel.Remote Subnet Mask

    Specifies the mask of the network behind the remote side of the tunnel.

    Local Interface IP Address

    IP address of the local side of the tunnel.

    Remote Interface IP Address

    IP address of the remote side of the tunnel.

    Multicasts Activates/deactivates sending multicast into the GRE tunnel: disabled - Sending multicast into the tunnel is inactive. enabled - Sending multicast into the tunnel is active.

    Pre-shared Key Specifies an optional value for the 32 bit shared key in numeric format, with this key the device sends the filtered data through the tunnel. Specify the same key on both devices, otherwise the device drops received packets.

    Note! The GRE tunnel does not pass through NAT.

    40 WISE-6610 Series User Manual

  • Example: GRE Tunnel Configuration

    Figure 3.28 Topology of GRE Tunnel Configuration ExampleGRE tunnel configuration:

    Examples of different options for configuration of GRE tunnel can be found in theapplication note GRE Tunnel [7].

    3.4.6 L2TP

    To open the L2TP Tunnel Configuration page, click L2TP in the Configuration sectionof the main menu. The L2TP tunnel function allows you to create a passwordprotected connection between 2 LAN networks. The device activates the tunnelsafter you mark the Create L2TP tunnel check box.

    Configuration A BRemote IP Address 10.0.0.2 10.0.0.1Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0

    Note! L2TP is an unencrypted protocol. L2TP via IPv6 is not supported.

    WISE-6610 Series User Manual 41

  • To access this page, click Configuration > L2TP.

    Figure 3.29 Configuration > L2TP

    Example: L2TP Tunnel Configuration

    Figure 3.30 Topology of L2TP Tunnel Configuration Example

    Item DescriptionMode Specifies the L2TP tunnel mode on the device side:

    L2TP server - Specify an IP address range offered by the server. L2TP client - Specify the IP address of the server.

    Server IP Address IP address of the server.Client Start IP Address

    IP address to start with in the address range. The range is offered by the server to the clients.

    Client End IP Address

    The last IP address in the address range. The range is offered by the server to the clients.

    Local IP Address IP address of the local side of the tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet Address of the network behind the remote side of the tunnel.Remote Subnet Mask

    The mask of the network behind the remote side of the tunnel.

    Username Username for the L2TP tunnel login.Password Password for the L2TP tunnel login.

    42 WISE-6610 Series User Manual

  • Configuration of the L2TP tunnel:

    3.4.7 PPTP

    Select the PPTP item in the menu to configure a PPTP tunnel. PPTP tunnel allowspassword protected connections between two LANs. It is similar to L2TP. The tunnelsare active after selecting Create PPTP tunnel.To access this page, click Configuration > PPTP.

    Figure 3.31 Configuration > PPTP

    Configuration A BMode L2TP Server L2TP ClientServer IP Address N/A 10.0.0.1Client Start IP Address 192.168.2.5 N/AClient End IP Address 192.168.2.254 N/ALocal IP Address 192.168.1.1 N/ARemote IP Address N/A N/ARemote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Username username usernamePassword password password

    Note! PPTP is an unencrypted protocol. PPTP via IPv6 is not supported.

    Item DescriptionMode Specifies the L2TP tunnel mode on the device side:

    PPTP server - Specify an IP address range offered by the server.

    PPTP client - Specify the IP address of the server.Server IP Address IP address of the server.Local IP Address IP address of the local side of the tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet Address of the network behind the remote side of the tunnel.Remote Subnet Mask

    The mask of the network behind the remote side of the tunnel.

    WISE-6610 Series User Manual 43

  • The changes in settings will apply after pressing the Apply button.The firmware also supports PPTP pass through, which means that it is possible tocreate a tunnel through the device.Example: PPTP Tunnel Configuration

    Figure 3.32 Topology of PPTP Tunnel Configuration ExampleConfiguration of the PPTP tunnel:

    3.4.8 Services

    3.4.8.1 DynDNSThe DynDNS function allows you to access the device remotely using an easy toremember custom hostname. This DynDNS client monitors the IP address of thedevice and updates the address whenever it changes. In order for DynDNS tofunction, you require a public IP address, either static or dynamic, and an activeRemote Access service account at www.dyndns.org. Register the custom domain(third-level) and account information specified in the configuration form. You can useother services, too - see the table below, Server item. To open the DynDNSConfiguration page, click DynDNS in the main menu.

    Username Username for the PPTP tunnel login.Password Password for the PPTP tunnel login.

    Configuration A BMode PPTP Server PPTP ClientServer IP Address N/A 10.0.0.1Local IP Address 192.168.1.1 N/ARemote IP Address 192.168.2.1 N/ARemote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Username username usernamePassword password password

    Item Description

    44 WISE-6610 Series User Manual

  • To access this page, click Configuration > Services > DynDNS.

    Figure 3.33 Configuration > Services > DynDNS

    Example: DynDNS client configuration with the domain company.dyndns.org:

    Figure 3.34 DynDNS Configuration Example

    Item DescriptionHostname The third order domain registered on the www.dyndns.org server.Username Username for logging into the DynDNS server.Password Password for logging into the DynDNS server.IP Mode Specifies a DynDNS service other than the www.dyndns.org. Possible

    other services: www.spdns.de, www.dnsdynamic.org, www.noip.com.Enter the update server service information in this field. If you leave this field blank, the default server members.dyndns.org will be used.

    Server Specifies the version of IP protocol: IPv4 - IPv4 protocol is used only (default). IPv6 - IPv6 protocol is used only. IPv4/IPv6 - IPv4 and IPv6 dual stack is enabled.

    WISE-6610 Series User Manual 45

  • 3.4.8.2 HTTPTo access this page, click Configuration > Services > HTTP.

    Figure 3.35 Configuration > Services > HTTP

    3.4.8.3 NTPThe NTP configuration form allows you to configure the NTP client. To open the NTPpage, click NTP in the Configuration section of the main menu. NTP (Network TimeProtocol) allows you to periodically set the internal clock of the device. The time is setfrom servers that provide the exact time to network devices. IPv6 Time Servers aresupported. If you mark the Enable local NTP service check box, then the device acts as a

    NTP server for other devices in the local network (LAN). If you mark the Synchronize clock with NTP server check box, then the device

    acts as a NTP client. This means that the device automatically adjusts the internal clock every 24 hours.

    To access this page, click Configuration > Services > NTP.

    Figure 3.36 Configuration > Services > NTP

    Item DescriptionEnable HTTP service Click the check box to set up Ethernet encapsulation (remote access)

    through HTTP function.Enable HTTPS service

    Click the check box to set up Ethernet encapsulation over HTTPS.

    Session Timeout Enter the variable in minutes to define the timeout period for the session.

    Apply Click Apply to save the values.

    Item DescriptionPrimary NTP Server IPv4 address, IPv6 address or domain name of primary NTP server.Secondary NTP Server

    IPv4 address, IPv6 address or domain name of secondary NTP server.

    Timezone Specifies the time zone where you installed the device.Daylight Saving Time Activates/deactivates the DST shift.

    No - The time shift is inactive. Yes - The time shift is active.

    46 WISE-6610 Series User Manual

  • The figure below displays an example of a NTP configuration with the primary serverset to ntp.cesnet.cz and the secondary server set to tik.cesnet.cz and with theautomatic change for daylight saving time enabled.

    Figure 3.37 Example of NTP Configuration

    3.4.8.4 SNMPThe SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sendsinformation about the device (and its expansion ports) to a management station. Toopen the SNMP page, click SNMP in the Configuration section of the main menu.SNMP (Simple Network Management Protocol) provides status information about thenetwork elements such as devices or endpoint computers. In the version v3, thecommunication is secured (encrypted). To enable the SNMP service, mark theEnable the SNMP agent check box. Sending SNMP traps to IPv6 address issupported.To access this page, click Configuration > Services > SNMP.

    Figure 3.38 Configuration > Services > SNMP

    Item DescriptionName Designation of the device.

    WISE-6610 Series User Manual 47

  • To enable the SNMPv1/v2 function, mark the Enable SNMPv1/v2 access check box.It is also necessary to specify a password for access to the Community SNMP agent.The default setting is public.You can define a different password for the Read community (read only) and theWrite community (read and write) for SNMPv1/v2. You can also define 2 SNMP usersfor SNMPv3. You can define a user as read only (Read), and another as read andwrite (Write). The device allows you to configure the parameters in the following tablefor every user separately. The device uses the parameters for SNMP access only.To enable the SNMPv3 function, mark the Enable SNMPv3 access check box, thenspecify the following parameters:

    Activating the Enable I/O extension function allows you monitor the binary I/O inputson the device.Selecting Enable M-BUS extension and entering the Baudrate, Parity and Stop Bitslets you monitor the meter status connected to the expansion port MBUS status.Selecting Enable reporting to supervisory system and entering the IP Address andPeriod lets you send statistical information to the monitoring system, R-SeeNet.

    Each monitored value is uniquely identified using a numerical identifier OID - ObjectIdentifier. This identifier consists of a progression of numbers separated by a point.The shape of each OID is determined by the identifier value of the parent elementand then this value is complemented by a point and current number. So it is obvious

    Location Location of where you installed the device.Contact Person who manages the device together with information how to

    contact this person.

    Item DescriptionUsername User nameAuthentication Encryption algorithm on the Authentication Protocol that is used to

    verify the identity of the users.Authentication Password

    Password used to generate the key used for authentication.

    Privacy Encryption algorithm on the Privacy Protocol that is used to ensure confidentiality of data.

    Privacy Password Password for encryption on the Privacy Protocol.

    Item DescriptionIP Address IPv4 or IPv6 address.Period Period of sending statistical information (in minutes).

    Item Description

    48 WISE-6610 Series User Manual

  • that there is a tree structure. The following figure displays the basic tree structure thatis used for creating the OIDs.

    Figure 3.39 OID Basic StructureThe SNMP values that are specific for Conel devices create the tree starting at OID =.1.3.6.1.4.1.30140. You interpret the OID in the following manner:

    iso.org.dod.intern